Michael Babcock wrote:
What is the process for checking commands entered when using $VS? I can
protect the use of $VS using the JES2.$VS profile but there doesn't
appear to be any granularity for which commands can be entered.
Let's say the following is found in JCL.
/*$VS,ROUTE node1,someCo
Of Michael Babcock
Sent: Thursday, January 10, 2008 1:40 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: JES2 and $VS RACF Protection
What is the process for checking commands entered when using $VS? I can
protect the use of $VS using the JES2.$VS profile but there doesn't appear
to be any granul
What is the process for checking commands entered when using $VS? I can
protect the use of $VS using the JES2.$VS profile but there doesn't
appear to be any granularity for which commands can be entered.
Let's say the following is found in JCL.
/*$VS,ROUTE node1,someCommand
JES2 checks the $
What is the process for checking commands entered when using $VS? I can
protect the use of $VS using the JES2.$VS profile but there doesn't
appear to be any granularity for which commands can be entered.
Let's say the following is found in JCL.
/*$VS,ROUTE node1,someCommand
JES2 checks the
4 matches
Mail list logo